Skip to content

Security: Community skills distributed under anthropic/ namespace enable trust boundary abuse #492

@aliksir

Description

@aliksir

Summary

Community-made skills are being distributed under the anthropic/ namespace, impersonating official Anthropic skills. This creates a trust boundary vulnerability where users may grant elevated permissions to community skills they believe are official.

Discovery

During a comprehensive security audit of 580+ installed Claude Code skills, we found 6 skills placed under ~/.claude/skills/anthropic/:

Skill author field allowed-tools
anthropic-expert (root) not set Read, Grep, Glob
claude-code not set Read, Grep, Glob
claude-command-builder not set Read, Write, Edit, Grep, Glob, Bash
claude-mcp-expert raintree Read, Write, Edit, Grep, Glob, Bash
claude-hook-builder not set Read, Write, Edit, Grep, Glob, Bash
claude-settings-expert not set Read, Write, Edit, Grep, Glob
claude-skill-builder raintree Read, Write, Edit, Grep, Glob, Bash

None of these exist in the official anthropics/skills repository. Two skills explicitly list author: raintree, confirming they are community-made.

Security Concern

Trust Boundary Abuse

  1. Users see anthropic/ in the skill path and assume official Anthropic provenance
  2. This lowers their guard when approving operations — especially Bash execution and settings.json modifications
  3. claude-hook-builder can write PostToolUse hooks to settings.json, enabling arbitrary command execution after every tool use
  4. claude-settings-expert can directly edit settings.json and documents bypassPermissions (as a warning, but the JSON structure is shown)

Attack Scenario

User installs "anthropic/" skills from a community collection
  → Trusts them as official due to namespace
  → Approves Bash operations without scrutiny
  → claude-hook-builder writes a PostToolUse hook
  → All subsequent tool executions trigger arbitrary commands

Suggested Mitigations

  1. Reserved namespace: Prevent community skills from using anthropic/ as a directory name in skill registries
  2. Namespace verification: Add a verification mechanism (e.g., signed manifests) for official Anthropic skills
  3. Documentation: Warn users in the skills documentation that directory names do not imply official provenance

Note

The skills themselves do not appear to contain actively malicious code. The claude-hook-builder skill includes appropriate "USE AT YOUR OWN RISK" warnings. The concern is purely about the trust boundary created by the anthropic/ namespace impersonation.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type
    No fields configured for issues without a type.

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions